Gone In 59 Seconds High Speed Backdoor Injection via Bootable USB Piotr Marszalik Michael Wrzes De

Subscribers:
5,970
Published on ● Video Link: https://www.youtube.com/watch?v=OdFuZff2okU



Duration: 37:46
2 views
0


DerbyCon 7 Hacking conference
#hacking, #hackers, #infosec, #opsec, #IT, #security




Other Videos By All Hacking Cons


2022-05-04Hidden Treasure Detecting Intrusions with ETW Zac Brown DerbyCon 7
2022-05-04Memory Based Library Loading Someone Did That Already Casey Rosini DerbyCon 7
2022-05-04Derbycon 7 Opening DerbyCon 7
2022-05-04Windows Event Logs Zero 2 Hero Nate Guagenti Adam Swan DerbyCon 7
2022-05-04MacOS host monitoring the open source way Michael George DerbyCon 7
2022-05-04Here Be Dragons The Unexplored Land of Active Directory ACLs Andy Robbins Will Schroeder Rohan Der
2022-05-04Defending against PowerShell Attacks Lee Holmes DerbyCon 7
2022-05-04Hacking Blockchains Aaron Hnatiw DerbyCon 7
2022-05-04Run your security program like a boss practical governance advice Justin Leapline Rockie Brockw De
2022-05-04CredDefense Toolkit Beau Bullock Brian Fehrman Derek Banks DerbyCon 7
2022-05-04Gone In 59 Seconds High Speed Backdoor Injection via Bootable USB Piotr Marszalik Michael Wrzes De
2022-05-04Blue Team Keeping Tempo with Offense Casey Smith Keith McCammon AF DerbyCon 7
2022-05-04Full Contact Recon int0x80 of Dual Core savant DerbyCon 7
2022-05-02105 A Year in the Empire Will Schroeder Matt Nelson DerbyCon 6
2022-05-02117 Breaking Android Apps for Fun and Profit Bill Sempf DerbyCon 6
2022-05-02104 Macs Get Sick Too Tyler Halfpop Jacob Soo DerbyCon 6
2022-05-02116 Make STEHM Great Again David Schwartzberg and Chris Sistrunk DerbyCon 6
2022-05-02103 Writing malware while the blue team is staring at you Mubix Rob Fuller DerbyCon 6
2022-05-02115 How to Social Engineer your way into your dream job Jason Blanchard DerbyCon 6
2022-05-02102 Thinking Purple Carlos Perez DerbyCon 6
2022-05-02114 Embrace the Bogeyman Tactical Fear Mongering for Those Who Penetrate FuzzyNop DerbyCon 6



Tags:
data
hacker
security
computer
cyber
internet
technology
hacking
attack
digital
virus
information
hack
online
crime
password
code
web
concept
thief
protection
network
scam
fraud
malware
secure
identity
criminal
phishing
software
access
safety
theft
system
firewall
communication
business
privacy
binary
account
spy
programmer
program
spyware
hacked
hacking conference
conference
learn
how to
2022
2021
cybersecurity
owned
break in
google
securing
exploit
exploitation
recon
social engineering